CVE-2025-67719

N/A Unknown

📋 TL;DR

Ibexa DXP versions 5.0.0-beta1 through 5.0.3 have a password validation bypass vulnerability. Authenticated users can change their password without providing their current password, enabling account takeover if an active session is compromised. This affects all Ibexa DXP installations running vulnerable versions.

💻 Affected Systems

Products:
  • Ibexa DXP
Versions: 5.0.0-beta1 through 5.0.3
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects back office password change functionality. Requires authenticated user session.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with temporary access to a logged-in user's workstation could change the password, permanently locking out the legitimate user and gaining persistent access to their account and privileges.

🟠

Likely Case

Insider threat or opportunistic attacker changes password of unattended logged-in session, causing account lockout and potential data exposure.

🟢

If Mitigated

With proper session timeout policies and workstation locking, risk is limited to authorized users intentionally bypassing password validation.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to an authenticated session. No special tools or skills needed - just access to password change interface.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.0.4

Vendor Advisory: https://developers.ibexa.co/security-advisories/ibexa-sa-2025-005-password-change-and-xss-vulnerabilities-in-back-office

Restart Required: Yes

Instructions:

1. Backup your installation. 2. Update to Ibexa DXP version 5.0.4 or later. 3. Clear cache: php bin/console cache:clear. 4. Restart web server.

🔧 Temporary Workarounds

Enforce Session Timeout

all

Reduce session lifetime to minimize window for unauthorized access

Configure session.gc_maxlifetime in php.ini to 1800 (30 minutes)

Disable Password Change Interface

all

Temporarily remove or restrict access to password change functionality

Use web server rules to block /user/change-password paths

🧯 If You Can't Patch

  • Implement mandatory workstation locking policies for all users
  • Enable multi-factor authentication for administrative accounts

🔍 How to Verify

Check if Vulnerable:

Check if password can be changed in back office without providing current password while logged in

Check Version:

php bin/console ibexa:version

Verify Fix Applied:

After update, verify password change requires current password validation

📡 Detection & Monitoring

Log Indicators:

  • Multiple password change attempts from same session
  • Password changes without 'current password' validation in logs

Network Indicators:

  • POST requests to password change endpoints without current password parameter

SIEM Query:

source="web_logs" AND (uri_path="/user/change-password" OR uri_path="/user/update-password") AND NOT form_data CONTAINS "current_password"

🔗 References

📤 Share & Export